Virtual Events Archive

Sponsored by: Wind River
Sep 26, 2020 8AM EDT (3 years, 10 months ago)
You must anticipate that a breach will happen. Learn to model different threat scenarios and put in place mechanisms to protect your applications, data, IP, and the resiliency of the device. Your threat model should assume that an attacker will get root (admin) access. 
Sponsored by: Wind River
Sep 25, 2020 8AM EDT (3 years, 10 months ago)
Your device is only as secure as its weakest link, so you must build on top of a proven and trusted platform with hardware-based security features as well as trustworthy software vendors, code pedigree, and secure software development practices.
Sponsored by: Wind River
Sep 24, 2020 8AM EDT (3 years, 10 months ago)
Building your security policy starts with determining the device’s assets, identifying threats to those assets, and defining mitigations to those threats. Your policy has to factor in your risk tolerance as you determine which mitigations to implement.
Sponsored by: Wind River
Sep 23, 2020 8AM EDT (3 years, 10 months ago)
Planning for security requirements up front greatly reduces friction and cost throughout development and deployment. Learn how they will influence the direction your project takes, and what you will need to prove you’ve met them.
Sponsored by: Advantech Europe
Sep 22, 2020 2PM EDT (3 years, 10 months ago)
Embedded Single Boards are the solutions-to-go to meet high performance IoT demands. Don't compromise for performance & board size: learn how to easily migrate actual and future application demands like Artificial Intelligence of Things and 5G connectivity using our tailored system approach with ou...
Sponsored by: IAR Systems
Sep 02, 2020 11AM EDT (3 years, 10 months ago)
System security often starts with a secure boot process, which is managed by the Secure Boot Manager, which lives alongside the provisioning of secure keys and certificates, to provide a robust root of trust. If your system does not deploy a secure boot mechanism, you’re clearly opening yourself up...
Sponsored by: IAR Systems
Aug 26, 2020 11AM EDT (3 years, 11 months ago)
Secure Provisioning involves defining a key infrastructure during the development process to dynamically generate secure keys, then insert those keys into the device along with a cryptographically secured application image. That process sounds complex, but it needn’t be if you follow a step-by-step...
Sponsored by: IAR Systems
Aug 19, 2020 11AM EDT (3 years, 11 months ago)
Secure contexts define the configuration of the trusted execution environment and ensure that minimum standards of authentication and confidentiality are met. In many cases, APIs are only accessible via a secure context. This is a method of ensuring that your embedded code remains secure and out of...
Sponsored by: Advantech
Aug 18, 2020 2PM EDT (3 years, 11 months ago)
AI is transforming industries like manufacturing, retail, smart cities, transportation, healthcare and more. Applications are moving towards edge computing to enable real-time decision making without the limitations of latency, cost, bandwidth, and power consumption. This trend has led to a rapid in...
Sponsored by: IAR Systems
Aug 12, 2020 11AM EDT (3 years, 11 months ago)
Your IP is essentially the crown jewels of your design, if not your entire company. Hence, it’s vital to ensure that it remains secure. However, it’s not always obvious where the weak link in your protection chain resides. And there’s far more to it than the old adage of “monitor, detect, and respon...
Sponsored by: IAR Systems
Aug 05, 2020 11AM EDT (3 years, 11 months ago)
Depending on your geography, or more specifically, the intended geography for your embedded design, the rules surrounding security may be different than other geographies. Different governments and other legislative bodies are continually changing the rules of the game. And again, depending on your...
Sponsored by: BlackBerry QNX
Jul 23, 2020 11AM EDT (4 years ago)
We are living in a world where devices are becoming more connected. And this opens the door to innovation and new business opportunities. But it also leaves device manufacturers and OEMs struggling to balance evolving market demands with staying ahead of the growing threat of cyberattacks and the p...
Sponsored by: Arm
Jul 22, 2020 11AM EDT (4 years ago)
With increasing signal processing requirements in various types of embedded systems, some companies designed chips that combine both a digital signal processor (DSP) and a general-purpose processor to address the processing demands. While this suits some high-performance devices where silicon area a...
Sponsored by: Innodisk Corporation
Jul 20, 2020 2PM EDT (4 years ago)
One of the major factors of digital transformation is AIoT, which delivers intelligent connected systems that are capable of self-correcting. One of Innodisk’s products, InnoAge comes with a Microsoft Azure Sphere inside and is further integrated with Innodisk’s customized firmware, software, and ha...
Sponsored by: Connect Tech, NVIDIA
Jul 14, 2020 2PM EDT (4 years ago)
The continuous battle when designing Edge AI and autonomous machines is balancing size, weight, power, and cost (SWaP-C) requirements. NVIDIA’s newest embedded platform opens possibilities for AI projects with unparalleled size vs. power capabilities. Join Connect Tech and NVIDIA’s embedded experts...
Sponsored by: Lynx Software Technologies, RTI
Jun 30, 2020 2PM EDT (4 years ago)
IoT systems tend to be thought of as a “clean slate” environment where historical systems have no bearing. This couldn’t be further from the truth when considering Industrial IoT. IIoT must be an extension of the existing industrial systems in order to enable a new business model without disrupting...
Sponsored by: Intel IOT Solutions Alliance, Capsule Technologies, Medical Informatics Corp
Jun 23, 2020 2PM EDT (4 years, 1 month ago)
The pandemic presented new challenges for patient monitoring. Safety concerns and staff burdens shifted dramatically, creating a pressing need for inpatient telehealth strategies. As healthcare providers transition into a recovery phase, what can we learn from this experience?
Sponsored by: Wittenstein
Jun 23, 2020 11AM EDT (4 years, 1 month ago)
This webinar looks at how FreeRTOS is the ideal starting point for embedded applications, even those that target a safety critical application. Follow along at home with the NXP FRDM-K64F as we see the differences between FreeRTOS and the safety critical RTOS SAFERTOS®; why these differences are nec...
Sponsored by: GrammaTech, Wibu-Systems
Jun 17, 2020 2PM EDT (4 years, 1 month ago)
Untrustworthy software can have a significant impact on industrial systems. That impact could range from machine down time to lives being at stake? Do you want to bet your company’s assets on untrustworthy software over the complete lifecycle of your equipment? In this webinar, we will provide a hig...
Sponsored by: dSPACE, RTI
Jun 09, 2020 11AM EDT (4 years, 1 month ago)
ADAS, AI, and autonomous vehicles are lumped together, for good reason; they all feed off one another. Can one advance without the other? Probably, but not nearly as seamlessly. This webinar will look at each of these elements separately, but then dive in on how they need to operate cohesively.
Sponsored by: Kontron, Litmus
May 28, 2020 2PM EDT (4 years, 1 month ago)
The connected factory vision involves organizing the factory floor, IT, and business systems to optimize efficiency, reduce risk, increase agility, and spark innovation. This vision requires a new level of interoperability between factory, IT, and business operations. Machines must be integrated. So...
Sponsored by: Blackberry QNX
May 28, 2020 11AM EDT (4 years, 1 month ago)
Advances in embedded electronics, such as hardware miniaturization, have allowed for substantial increases in processing power, tighter integration of peripherals and savings in power consumption. These advances have enabled innovations like assisted driving and electrification in cars, and intensiv...
Sponsored by: Real-Time Innovations (RTI)
May 21, 2020 2PM EDT (4 years, 2 months ago)
Autonomous vehicle system software is becoming more complex as we move towards greater levels of autonomy. Moving from one level of autonomy to the next requires an increase in the complexity of the system software by a factor of 10x or more. How do we build the right system software architecture th...
Sponsored by: Real-Time Innovations (RTI)
May 14, 2020 2PM EDT (4 years, 2 months ago)
Choosing the right architecture for highly and fully automotive driving is a bet on the future of the industry and the success of your company. Where speed to market is critical, a platform that supports rapid development, a wide variety of future use cases and massive data flows is imperative. You...
Sponsored by: Real-Time Innovations (RTI)
May 07, 2020 2PM EDT (4 years, 2 months ago)
Autonomy will profoundly reshape the automotive competitive landscape. For decades, traditional OEMs competed on driver experience, engine performance, styling and cost. In a world with no drivers, no engines and no car ownership, none of these factors matter. Worse, rather than lowering costs, form...